Handwritten Signature Verification Using DRT

Size: px
Start display at page:

Download "Handwritten Signature Verification Using DRT"

Transcription

1 Mathematical Problems of Computer Science 39, , Vahe S. Khachaturyan Institute for Informatics and Automation Problems of NAS of RA Abstract The purpose of this research is the development of mathematical and algorithmic support, which will improve the accuracy of signature verification. The algorithms compute the distances whilecomparing signatures based on DRT and HMM. For acceptance or rejection of the test signature a sliding threshold is used for all the authors, and depending on the author athresholdmethod is used, based on the distances between the test signature and the signatures of control, taking them as signs of the problem of two-class classification, using standard methods of imageclassification. Keywords: Signature Verification, discrete Radon transform, hidden Markov model. 1. Introduction The purpose of our research is to develop a system that automatically classifies handwritten signature images as authentic or fraudulent, with as little misclassifications as possible. At the same time, the processing requirements must be feasible so as to make the adoption of such an automated system economically viable. Our work is inspired by, amongst others, the potential financial benefits that the automatic clearing of checks will have for the banking industry. Despite theincreasing number of electronic alternatives to paper checks, fraud perpetrated at financial institutions in the United States has become a national epidemic. The National Check Fraud Center Report of 2000 [1] states that:...check fraud and counterfeiting are among the fastest-growing crimes affecting the United States financial system, producing estimated annual losses exceeding $10 billion with the number continuing to rise at an alarming rate each year. Since commercial banks pay little attention to verifying signatures on checks mainly due to the number of checks that are processed daily - a system capable of screening casual forgeries should already prove beneficial. In fact, most forged checks contain forgeries of this type. We developed a system that automatically authenticates documents based on the owner s handwritten signature. It should be noted that our system assumes that the signatures have already been extracted from the documents. Methods for extracting signature data from check backgrounds can be found in the following papers [2, 3, 4]. Our system will assist commercial banks in the process of screening checks and is not intended to replace the manual screening of checks entirely. Those checks the signatures of which do not sufficiently match a model of the 31

2 32 owner s genuine signature, are provisionally rejected. Generally, these rejected checks will constitute a small percentage of the total number of checks processed daily, and only these checks are selected for manual screening. Since the introduction of computers, modern society has become increasingly dependent on the electronic storage and transmission of information. In many transactions, the electronic verification of a person s identity proved beneficial and this inspired the development of a wide range of automatic identification systems. Plamondon and Srihari [5] note that automatic signature verification systems occupy a very specific niche among other automatic identification systems: On the one hand, they differ from systems based on the possession of something (key, card, etc.) or the knowledge of something (passwords, personal information, etc.), asthey rely on a specific, well learned gesture. On the other hand, they also differ from systems based on the biometric properties of an individual (finger prints, voice prints, retinal prints, etc.), asthe signature is still the most socially and legally accepted means of personal identification. Although handwritten signatures are by no means the most reliable means of personal identification, the signature verification systems are inexpensive and nonintrusive. Handwritten signatures provide a direct link between the writer s identity and transaction, and are therefore perfect for endorsing transactions. 2. Image Processing Each signature is scanned into a binary image at a resolution of 300 dots per inch, after which a median filtering is applied to remove speckle noise. On the average, a signature image has a width of 400 to 600 pixels and a height of 200 to 400 pixels. The image dimensions are not normalized. Subsequently, the DRT of each signature is calculated. Each column of the DRT represents a projection or shadow of the signature at a certain angle. After these projections are processed and normalized, they represent a set of feature vectors (observation sequence) for the signature in question. The DRT of an image is calculated as follows. Assume that each signature image consists of Ψ pixels in total, and that the intensity of the ith pixel is denoted by Ii, i = 1,...,Ψ. The DRT is calculated using β not overlapping beams per angle and Θ angles in total. The cumulative intensity of the pixels that lie within the jth beam is denoted by R j, j = 1,..., βθ. This is called the jth beam sum. In its discrete form, the Radon transform can therefore be expressed as follows: Ψ R j = i=1 ω, = 1,2,,, (1) Fig 1. Discrete model for the Radon transform withω 0.9.

3 V. Khachaturyan 33 Fig 2. (a) A signature and its projections are calculated at angles of 0 and 90. (b) The DRT is displayed as a gray-scale image. This image has Θ = 128 columns, where each column represents a projection. Here ω indicates the contribution of the ith pixel to the jth beam sum (see Figure 1). The value of ω is found through two-dimensional interpolation. Each projection therefore contains beam sums that are calculated at a given angle. The accuracy of the DRT is determined by Θ (the number of angles), β (the number of beams per angle), and the accuracy of the interpolation method. Note that the continuous form of the Radon transform can be inverted through analytical means. The DRT therefore contains almost the same information as the original image and can be efficiently calculated with an algorithm by Bracewell [8]. Our system calculates the DRT at Θ angles. These angles are equally distributed between 0 and 180. A typical signature and its DRT are shown in Figure 2. The dimension of each projection is subsequently altered from β to d. This is done by first decimating all the zerovalued components from each projection. These decimated vectors are then shrunk or expanded to a length of d through interpolation. Although almost all the information in the original signature image is contained in the projections at angles that range from 0 to 180, the projections at angles that range from 180 to 360 are also included in the observation sequence. These additional projections are added to the observation sequence in order to ensure that the sequence fits the topology of our HMM (see Section 3.2). Since these projections are simply reflections of the projections already calculated, no additional calculations are necessary. An observation sequence therefore consists of T = 2Θ feature vectors, that is, =,,,.Each vector is subsequently normalized by the variance of the intensity of the entire set of T feature vectors. Each signature pattern is therefore represented by an observation sequence that consists of T observations, where each observation is a feature vector of dimension d. The experimental results and computational requirements for various values of d and Θ are discussed in Section 5, respectively. The DRT, as a feature extraction technique, has several advantages. Although the DRT is not a shift invariant representation of a signature image, the shift and scale invariance is ensured by the subsequent image processing. Each signature is a static image and contains no dynamic information. Since the feature vectors are obtained by calculating projections at different angles, a simulated time evolution is created from one feature vector to the next, where the angle is the dynamic variable. This enables us to construct an HMM for each signature (see Section 3). The DRT is calculated at angles that range from 0 to 360 and each observation sequence is then

4 34 modeled by an HMM the states of which are organized in a ring (see Section 3.2). This ensures that each set of feature vectors is rotation invariant. Our system is also robust with respect to moderate levels of noise. These advantages are now discussed in more detail. Noise We explained earlier in this section that the zero-valued components of each projection are decimated before the remaining non-zero components are shrunk or expanded through interpolation. In this way, a feature vector with the required dimension is obtained. The decimation of the zero-valued components ensures that moderate levels of noise (which are represented by a few additional small-valued components within certain projections) are attached to the other nonzero components before the decimated vector is shrunk or expanded. Since the dimension of the feature vectors are high compared to the number of these additional components, the incorporation of these components has little effect on the overall performance of the system. Shift invariance Although the DRT is not a shift invariant representation of a signature image, the shift invariance is ensured by the subsequent image processing. The zero-valued components of each projection are decimated and the corresponding feature vector is constructed from the remaining components only. Rotation invariance The DRT is calculated at angles that range from 0 to 360 and each set of feature vectors is then modeled by an HMM the states of which are organized in a ring (see Section 3.2). Each signature is therefore represented by a set of feature vectors that is rotation invariant. Scale invariance For each projection, the scale invariance has to be achieved in the direction perpendicular to the direction in which the image is scanned, that is, perpendicular to the beams, and in the direction parallel to the beams. The scale invariance perpendicular to the beams is ensured by shrinking or expanding each decimated projection to the required dimension. The scale invariance parallel to the beams is achieved by normalizing the intensity of each feature vector. This is achieved by dividing each feature vector by the variance of the intensity of the entire set of feature vectors. 3. Signature Modelling We use a first-order continuous observation HMM to model each writer s signature. For a tutorial on HMMs, the reader is referred to a paper by Rabiner [9] and the book by Deller et al. Notation We use the following notation for an HMM λ. (1) We denote the N individual states as =,,, (2) and the state at time t as q t. (2) The initial state distribution is denoted by π = {π i }, where = =, = 1,,. (3) (3) The state transition probability distribution is denoted by A = {a i,j }, where = = = ), = 1,,, = 1,,. (4) (4) The probability density function (pdf), which quantifies the similarity between a feature vector x and the state s j, is denoted by,, = 1,,. (5)

5 V. Khachaturyan 35 HMM topology We use an HMM, the states of which are organized in a ring (see Figure 3). Our model is equivalent to a left-to-right model, but a transition from the last state to the first oneis allowed. Since the HMM is constructed in such a way that it is equally likely to enter the model at any state, and the feature vectors are obtained from all the projections, that is, the projections calculated at angles ranging from 0 to 360, the ring topology of our HMM guarantees that the signatures are rotation invariant. Each state in the HMM represents one or more feature vectors that occupy similar positions in a d-dimensional feature space. This implies that the HMM groups certain projections (columns of the DRT) together. It is important to note that this segmentation process only takes place after some further image processing has been conducted on the original projections. Fig 3. An example of an HMM with a ring topology. This model has ten states with one state skip. Training Each model is trained using the Viterbi reestimation technique. The dissimilarity between an observation sequence X and a model λ can therefore be calculated as follows (see [9]):, = ln, (6) In real-world scenarios, each writer can only submit a small number of training samples when he or she is enrolled into the system. Since our algorithm uses feature vectors with a high dimension, the reestimated covariance matrix of the pdf for each state is not reliable and may even be singular. A Mahalanobis distance measure therefore cannot be found. Consequently, these covariance matrices are not reestimated and are initially set to 0.5I, where Iis the identity matrix. Only the mean vectors are reestimated, which implies that the dissimilarity values are based on theeuclidean distance measure. We assume that training signatures, genuine test signatures, and forgeries are available for only a limited number of writers, that is, for the writers in our database. No forgeries are used in the training process since our system aims to detect only skilled and casual forgeries, and these types of forgeries are not available when our system is implemented. The genuine test signatures and forgeries are used to determine the error rates for our system (see Section 5). Assuming that there are W writers in our database, the training signatures for each writer are used to construct an HMM, resulting in W models, that is {λ 1, λ 2,...,λ W }. ( When the training set for the writer w is denoted by ) (, ) (,, ), where N w is the number of samples in the training set, the dissimilarity between every training sample and the model is used to determine the following statistics for the writer s signature:

6 36 = 1, λ, =, λ. (7) 4. Verification When a system aims to detect only random forgeries, the subsets of the other writer s training sets can be used to model typical forgeries. This is called an impostor validation and can be achieved through strategies like test normalization. These techniques enable one to construct verifiers that detect random forgeries very accurately (see [6, 7]). Since we aim to detect only skilled and casual forgeries, and since the models for these forgeries are generally unobtainable, we are not able to utilize any of these impostor validation techniques. We also do not use any subset of genuine signatures for validation purposes. ( ) Our verifier is constructed as follows. When a claim is made that the test pattern belongs to the writer w, the pattern is first matched with the model λ w through Viterbi alignment. This match is quantified by ( λ ). The dissimilarity between the test pattern and the model is then calculated as follows (see [9]): λ = ln ( λ ). (8) In order to use a global threshold for all writers, Dolfing [6] suggests that every dissimilarity value in (8) is normalized, using the statistics of the claimed writer s signature, that is, (7): λ =, (9) where λ denotes the normalized dissimilarity between the test pattern and the model of the claimed writer s signature. This normalization is based on the assumption that the dissimilarity value in (8) is based on the Mahalanobis distance measure. For mean vectors the dissimilarity value in (8) is based on the Euclidean distance measure. When this is the case, we found that significantly better results are obtained when the standard deviation of the dissimilarities of the training set, that is, σ w in (9), is replaced by the mean μ w, that is, λ =. (10) A sliding threshold τ, where τ (, ), is used to determine the error rates for the test patterns. When λ < τ, that is, λ < 1 + τ, (11) the claim is accepted, otherwise, the claim is rejected. When τ = 0, all the test patterns, for which λ, are rejected. This almost always results in an FRR close to 100% and an FAR close to 0%.When τ, all the test patterns, for which λ is finite, are accepted. This always results in an FRR of 0% and an FAR of 100%. This technique is simple to apply in a program coding and further performance can be improved by using a better classification algorithm.

7 V. Khachaturyan Experiments Our data set contains 924 signatures from 22 writers. Ten training signatures were obtained from each writer during theinitial enrollment session. Thirty-two test signatures, that consist of 20 genuine signatures, 6 skilled forgeries, and 6 casual forgeries, were subsequently obtained over a period of two weeks. The 20 genuine test signatures consist of two sets of 10 signatures each. These signatures were supplied by the same writers one week and two weeks after the enrollment session. The forgeries were obtained from 6 forgers. The casual forgeries were obtained first. Only the name of the writer was supplied to the forgers and they did not have access to the writer s signatures. The skilled forgeries were then obtained from the same group of forgers. They were provided with several samples of each writer s genuine signature and were allowed ample opportunity to practice. Each forger submitted 1 casual forgery and 1 skilled forgery for each writer. The writers were instructed to produce each signature within an appropriate rectangular region on a white sheet of paper. The signatures were then digitized with a flatbed scanner at a resolution of 300 dots per inch. The genuine signatures were produced with different pens and the forgeries were produced with the same pens that were used for producing the genuine signatures. These signatures are free of excessive noise, smears, and scratches. Fig. 4. The Stellenbosch data set. Graphs for the FRR and the FAR when d = 512, Θ = 128, N = 64, and l = 1. Results Let l denote the number of allotted forward links in our HMM. Figure 4 shows the FRR and FAR as functions of our threshold parameter τ [ 0.1, 1], when d = 512, Θ = 128, N = 64, and l = 1. The FRR and FAR for a test set that contains only skilled forgeries, and the FAR for a test set that contains only casual forgeries are plotted on the same system of axes. When, for example, a threshold of τ = 0.16 is selected, equation (11) implies that all the test patterns, for which λ 1.16, are rejected;the other patterns are accepted. When only the skilled forgeries are considered, this threshold selection will ensure an EER of approximately 18%. When only the casual forgeries are considered, our algorithm achieves an EER of 4.5%. It is clear that when the dimension of the feature vectors is decreased from d = 512 to d = 256 or even to d = 128, the performance of the system is not significantly compromised. The

8 38 performance of our system is generally enhanced when the number of feature vectors, that is, T=2θ, or the number of states in the HMM, that is, N, is increased. The best results are obtained when only one forward link is allowed in the HMM, that is, whenl = Conclusions The DRT is a stable and robust method of feature extraction. The DRT creates a simulated time evolution from one feature vector to the next one and enables us to model a signature with an HMM. Our system is not sensitive to moderate levels of noise, and the feature vectors are extracted in such a way that rotation, shift, and scale invariance is ensured. Our system does not outperform all these systems. These systems do, however, utilize either a technique or features that are fundamentally very different from ours. This implies that it is very likely that a combination of their systems and that of ours will result in a superior merged system, making their approaches complementary to ours. We also expect a significant improvement in our results when local features are incorporated into our algorithm. This is currently being investigated. References [1] National Check Fraud Center, National Check Fraud Center Report, [2] S. Djeziri, F. Nouboud, and R. Plamondon, Extraction of signatures from cheque background based on a filiformity criterion, IEEE Trans. Image Processing, vol. 7, no. 10, pp , [3] A. L. Koerich and L. L. Lee, Automatic extraction of filledin information from bankchecks based on prior knowledge about layout structure, in Advances in Document Image Analysis: First Brazilian Symposium, Lecture Notes in Computer Science, vol. 1339, pp , [4] J. E. B. Santos, F. Bortolozzi, and R. Sabourin, A simple methodology to bankcheck segmentation, in Advances in Document Image Analysis: First Brazilian Symposium, Lecture Notes in Computer Science, vol. 1339, pp , [5] R. Plamondon and S. N. Srihari, On-line and off-line handwriting recognition: a comprehensive survey, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp , [6] R. Sabourin, G. Genest, and F. Prˆeteux, Off-line signature verification by local granulometric size distributions, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 19, no. 9, pp , [7] A. El-Yacoubi, E. J. R. Justino, R. Sabourin, and F. Bortolozzi, Off-line signature verification using HMMs and cross-validation, in IEEE International Workshop on Neural Networks for Signal Processing, pp , [8] R. N. Bracewell, Two-Dimensional Imaging, Prentice-Hall, Englewood Cliffs, NJ, USA, [9] L. R. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, Proceedings of the IEEE, vol. 77, no. 2, pp , Submitted , accepted

9 V. Khachaturyan 39 Ձեռագիր ստորագրություններ իստուգումը DRT-ի օգտագործմամբ Վ. Խաչատուրյան Ամփոփում Տվյալ աշխատանքի նպատակն է մաթեմատիկական և ալգորիթմային ապահովման մշակումը, որը թույլ կտա բարձրացնել ստորագրության ստուգման ճշգրտությունը: Ալգորիթմները հաշվարկում են հեռավորությունները ստորագրությունների համեմատման ժամանակ օգտագործելով DRT-ն և HMM-ը: Փորձարկվող ստորագրության ընդունման կամ մերժման համար օգտագործվում է սահող շեմքի մեթոդը բոլոր հեղինակների համար և կախված հեղինակից` շեմքի մեթոդը օգտագործելով փորձարկվող ստորագրության և ստուգողական ստորագրությունների միջև եղած հեռավորությունները դասակարգելով դրանք երկու դասերի պատկերների դասակարգման ստանդարտ մեթոդների միջոցով: Проверка рукописных подписей с использованием DRT В. Хачатурян Аннотация Целью данного исследования является разработка математического и алгоритмического обеспечения, которая позволит повысить точность проверки подписи. Алгоритмы вычисляют расстояния при сравнении подписей с помощью DRT и HMM. Для принятия или отказа тестовой подписи используется метод скользящего порога для всех авторов и зависящий от автора метод порога, с использованием расстояний между тестовой подписью и контрольными подписями, классифицируя их по двум классам, с использованием стандартных методов классификации изображений.

Off-line signature verification: a comparison between human and machine performance

Off-line signature verification: a comparison between human and machine performance Off-line signature verification: a comparison between human and machine performance J. Coetzer B.M. Herbst J.A. du Preez Mathematical Sciences, jcoetzer@sun.ac.za Mathematical Sciences, herbst@dip.sun.ac.za

More information

Analysis and Performance of Face Recognition System Using Log Gabor Filter Bank with HMM Model

Analysis and Performance of Face Recognition System Using Log Gabor Filter Bank with HMM Model Analysis and Performance of Face Recognition System Using Log Gabor Filter Bank with HMM Model Ankita Nigam and Rajeev Shrivastava Abstract In this paper I present a biometrics system performing identification,

More information

Online Signature Verification Technique

Online Signature Verification Technique Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,

More information

The Interpersonal and Intrapersonal Variability Influences on Off- Line Signature Verification Using HMM

The Interpersonal and Intrapersonal Variability Influences on Off- Line Signature Verification Using HMM The Interpersonal and Intrapersonal Variability Influences on Off- Line Signature Verification Using HMM EDSON J. R. JUSTINO 1 FLÁVIO BORTOLOZZI 1 ROBERT SABOURIN 2 1 PUCPR - Pontifícia Universidade Católica

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models

A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models A Visualization Tool to Improve the Performance of a Classifier Based on Hidden Markov Models Gleidson Pegoretti da Silva, Masaki Nakagawa Department of Computer and Information Sciences Tokyo University

More information

Off-line Signature Verification Using Neural Network

Off-line Signature Verification Using Neural Network International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February-2012 1 Off-line Signature Verification Using Neural Network Ashwini Pansare, Shalini Bhatia Abstract a number of

More information

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015

NOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015 Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET

More information

On-line Signature Verification on a Mobile Platform

On-line Signature Verification on a Mobile Platform On-line Signature Verification on a Mobile Platform Nesma Houmani, Sonia Garcia-Salicetti, Bernadette Dorizzi, and Mounim El-Yacoubi Institut Telecom; Telecom SudParis; Intermedia Team, 9 rue Charles Fourier,

More information

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction

Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Invariant Recognition of Hand-Drawn Pictograms Using HMMs with a Rotating Feature Extraction Stefan Müller, Gerhard Rigoll, Andreas Kosmala and Denis Mazurenok Department of Computer Science, Faculty of

More information

Handwritten Signature Verification And Recognition Using ANN

Handwritten Signature Verification And Recognition Using ANN Handwritten Signature Verification And Recognition Using ANN Mohan Mandaogade Saurabh Vishal Mhaske ABSTRACT Automatic person identification is one of the major concerns in this era of automation. However,

More information

User Signature Identification and Image Pixel Pattern Verification

User Signature Identification and Image Pixel Pattern Verification Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 3193-3202 Research India Publications http://www.ripublication.com User Signature Identification and Image

More information

Offline Signature verification and recognition using ART 1

Offline Signature verification and recognition using ART 1 Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification

More information

Signature Verification Why xyzmo offers the leading solution

Signature Verification Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all

More information

Machine Learning A W 1sst KU. b) [1 P] Give an example for a probability distributions P (A, B, C) that disproves

Machine Learning A W 1sst KU. b) [1 P] Give an example for a probability distributions P (A, B, C) that disproves Machine Learning A 708.064 11W 1sst KU Exercises Problems marked with * are optional. 1 Conditional Independence I [2 P] a) [1 P] Give an example for a probability distribution P (A, B, C) that disproves

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INTELLEGENT APPROACH FOR OFFLINE SIGNATURE VERIFICATION USING CHAINCODE AND ENERGY FEATURE EXTRACTION ON MULTICORE PROCESSOR Raju

More information

A System for Automatic Extraction of the User Entered Data from Bankchecks

A System for Automatic Extraction of the User Entered Data from Bankchecks A System for Automatic Extraction of the User Entered Data from Bankchecks ALESSANDRO L. KOERICH 1 LEE LUAN LING 2 1 CEFET/PR Centro Federal de Educação Tecnológica do Paraná Av. Sete de Setembro, 3125,

More information

Offline Signature Verification using Grid based and Centroid based Approach

Offline Signature Verification using Grid based and Centroid based Approach Offline Signature Verification using Grid based and Centroid based Approach Sayantan Roy Department of Computer Science Engineering ISM Dhanbad Jharkhand ABSTRACT Now a day s Signature verification is

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

Peg-Free Hand Geometry Verification System

Peg-Free Hand Geometry Verification System Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu

More information

Off-line Signature Verification Using Writer-Independent Approach

Off-line Signature Verification Using Writer-Independent Approach Off-line Signature Verification Using Writer-Independent Approach Luiz S. Oliveira, Edson Justino, and Robert Sabourin Abstract In this work we present a strategy for off-line signature verification. It

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

A Combined Method for On-Line Signature Verification

A Combined Method for On-Line Signature Verification BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0022 A Combined Method for On-Line

More information

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION

RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION RULE BASED SIGNATURE VERIFICATION AND FORGERY DETECTION M. Hanmandlu Multimedia University Jalan Multimedia 63100, Cyberjaya Selangor, Malaysia E-mail:madasu.hanmandlu@mmu.edu.my M. Vamsi Krishna Dept.

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an

More information

Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines

Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines Author Nguyen, Vu, Blumenstein, Michael, Muthukkumarasamy,

More information

Automatic Static Signature Verification Systems: A Review

Automatic Static Signature Verification Systems: A Review Automatic Static Signature Verification Systems: A Review 1 Vitthal K. Bhosale1 Dr. Anil R. Karwankar2 1 PG Student, Government College of Engineering, Aurangabad (M.S.), 2 Assistant Professor, Dept. Of

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

HMM-Based Handwritten Amharic Word Recognition with Feature Concatenation

HMM-Based Handwritten Amharic Word Recognition with Feature Concatenation 009 10th International Conference on Document Analysis and Recognition HMM-Based Handwritten Amharic Word Recognition with Feature Concatenation Yaregal Assabie and Josef Bigun School of Information Science,

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Short Survey on Static Hand Gesture Recognition

Short Survey on Static Hand Gesture Recognition Short Survey on Static Hand Gesture Recognition Huu-Hung Huynh University of Science and Technology The University of Danang, Vietnam Duc-Hoang Vo University of Science and Technology The University of

More information

EE 584 MACHINE VISION

EE 584 MACHINE VISION EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Design of Digital Signature Verification Algorithm using Relative Slopemethod

Design of Digital Signature Verification Algorithm using Relative Slopemethod Design of Digital Signature Verification Algorithm using Relative Slopemethod Prof. Miss. P.N.Ganorkar, Dept.of Computer Engineering SRPCE,Nagpur (Maharashtra), India Email:prachiti.ganorkar@gmail.com

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

Development of an Automated Fingerprint Verification System

Development of an Automated Fingerprint Verification System Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical

More information

Signature Verification: Why xyzmo offers the leading solution

Signature Verification: Why xyzmo offers the leading solution Signature Verification: Why xyzmo offers the leading solution Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered

More information

Multi-Modal Human Verification Using Face and Speech

Multi-Modal Human Verification Using Face and Speech 22 Multi-Modal Human Verification Using Face and Speech Changhan Park 1 and Joonki Paik 2 1 Advanced Technology R&D Center, Samsung Thales Co., Ltd., 2 Graduate School of Advanced Imaging Science, Multimedia,

More information

Online Signature Verification System using DRT, DCT and K-NN Classifier

Online Signature Verification System using DRT, DCT and K-NN Classifier IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 01 June 2016 ISSN (online): 2349-6010 Online Signature Verification System using DRT, DCT and K-NN Classifier

More information

Writer Recognizer for Offline Text Based on SIFT

Writer Recognizer for Offline Text Based on SIFT Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1057

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH

HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH http:// HANDWRITTEN SIGNATURE VERIFICATION USING NEURAL NETWORK & ECLUDEAN APPROACH Shalu Saraswat 1, Prof. Sitesh Kumar Sinha 2, Prof. Mukesh Kumar 3 1,2,3 Department of Computer Science, AISECT University

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

Iris Recognition for Eyelash Detection Using Gabor Filter

Iris Recognition for Eyelash Detection Using Gabor Filter Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition

More information

A Study on the Consistency of Features for On-line Signature Verification

A Study on the Consistency of Features for On-line Signature Verification A Study on the Consistency of Features for On-line Signature Verification Center for Unified Biometrics and Sensors State University of New York at Buffalo Amherst, NY 14260 {hlei,govind}@cse.buffalo.edu

More information

HANDWRITTEN SIGNATURE VERIFICATION BASED ON THE USE OF GRAY LEVEL VALUES

HANDWRITTEN SIGNATURE VERIFICATION BASED ON THE USE OF GRAY LEVEL VALUES HANDWRITTEN SIGNATURE VERIFICATION BASED ON THE USE OF GRAY LEVEL VALUES P.RAMESH 1, P.NAGESWARA RAO 2 1 Pg Scholar, Khadar Memorial Engineering College, JNTUH, 2 Professor, ECE, Khadar Memorial Engineering

More information

Fingerprint Recognition using Texture Features

Fingerprint Recognition using Texture Features Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient

More information

The Method of User s Identification Using the Fusion of Wavelet Transform and Hidden Markov Models

The Method of User s Identification Using the Fusion of Wavelet Transform and Hidden Markov Models The Method of User s Identification Using the Fusion of Wavelet Transform and Hidden Markov Models Janusz Bobulski Czȩstochowa University of Technology, Institute of Computer and Information Sciences,

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

Writer Authentication Based on the Analysis of Strokes

Writer Authentication Based on the Analysis of Strokes Writer Authentication Based on the Analysis of Strokes Kun Yu, Yunhong Wang, Tieniu Tan * NLPR, Institute of Automation, Chinese Academy of Sciences, Beijing, 00080 P.R.China ABSTRACT This paper presents

More information

2D CORRELATION FOR SIGNATURE MATCHING SIMON TEO BOON KWANG

2D CORRELATION FOR SIGNATURE MATCHING SIMON TEO BOON KWANG 2D CORRELATION FOR SIGNATURE MATCHING SIMON TEO BOON KWANG NATIONAL UNIVERSITY OF SINGAPORE DEPARTMENT OF ELECTRICAL & COMPUTER ENGINEERING 2004/2005 2D CORRELATION FOR SIGNATURE MATCHING SIMON TEO BOON

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

Chapter 11 Representation & Description

Chapter 11 Representation & Description Chain Codes Chain codes are used to represent a boundary by a connected sequence of straight-line segments of specified length and direction. The direction of each segment is coded by using a numbering

More information

Off-line Bangla Signature Verification

Off-line Bangla Signature Verification 2012 10th IAPR International Workshop on Document Analysis Systems Off-line Bangla Signature Verification Srikanta Pal University, Gold Coast srikanta.pal@griffithuni. edu.au Vu Nguyen University, Gold

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification

Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification Author Armand, Stephane, Blumenstein, Michael, Muthukkumarasamy, Vallipuram Published 2006

More information

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa Algorithms for Recognition of Low Quality Iris Images Li Peng Xie University of Ottawa Overview Iris Recognition Eyelash detection Accurate circular localization Covariance feature with LDA Fourier magnitude

More information

Multi prototype fuzzy pattern matching for handwritten character recognition

Multi prototype fuzzy pattern matching for handwritten character recognition Multi prototype fuzzy pattern matching for handwritten character recognition MILIND E. RANE, DHABE P. S AND J. B. PATIL Dept. of Electronics and Computer, R.C. Patel Institute of Technology, Shirpur, Dist.

More information

Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring

Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring Offline Handwritten Signatures Classification Using Wavelet Packets and Level Similarity Based Scoring Poornima G Patil #1, Ravindra S Hegadi #2 1 Department of Computer Science and Applications 2 School

More information

Offline Signature Verification through Probabilistic Neural Network

Offline Signature Verification through Probabilistic Neural Network Offline Signature Verification through Probabilistic Neural Network Ooi Shih Yin 1, Andrew Teoh Beng Jin 2, Hiew Bee Yan 1, Pang Ying Han 1 1 Faculty of Information Science and Technology 2 School of Electrical

More information

A Fast Approximated k Median Algorithm

A Fast Approximated k Median Algorithm A Fast Approximated k Median Algorithm Eva Gómez Ballester, Luisa Micó, Jose Oncina Universidad de Alicante, Departamento de Lenguajes y Sistemas Informáticos {eva, mico,oncina}@dlsi.ua.es Abstract. The

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

Texture Image Segmentation using FCM

Texture Image Segmentation using FCM Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

Fingerprint Mosaicking by Rolling with Sliding

Fingerprint Mosaicking by Rolling with Sliding Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research

More information

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S

More information

A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS

A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS A. SERMET ANAGUN Industrial Engineering Department, Osmangazi University, Eskisehir, Turkey

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation K. Roy, U. Pal and B. B. Chaudhuri CVPR Unit; Indian Statistical Institute, Kolkata-108; India umapada@isical.ac.in

More information

Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition

Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition Effect of Initial HMM Choices in Multiple Sequence Training for Gesture Recognition Nianjun Liu, Richard I.A. Davis, Brian C. Lovell and Peter J. Kootsookos Intelligent Real-Time Imaging and Sensing (IRIS)

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia BiDA Lab- Biometrics and Data Pattern Analytics

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix Sumbal Iqbal Ahmed Peshawar Pakistan Rashid Jalal Qureshi Emirates Aviation University Dubai,UAE Imran Khan Peshawar,

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

Scene Text Detection Using Machine Learning Classifiers

Scene Text Detection Using Machine Learning Classifiers 601 Scene Text Detection Using Machine Learning Classifiers Nafla C.N. 1, Sneha K. 2, Divya K.P. 3 1 (Department of CSE, RCET, Akkikkvu, Thrissur) 2 (Department of CSE, RCET, Akkikkvu, Thrissur) 3 (Department

More information

Based on Regression Diagnostics

Based on Regression Diagnostics Automatic Detection of Region-Mura Defects in TFT-LCD Based on Regression Diagnostics Yu-Chiang Chuang 1 and Shu-Kai S. Fan 2 Department of Industrial Engineering and Management, Yuan Ze University, Tao

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION

NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION NOVEL HYBRID GENETIC ALGORITHM WITH HMM BASED IRIS RECOGNITION * Prof. Dr. Ban Ahmed Mitras ** Ammar Saad Abdul-Jabbar * Dept. of Operation Research & Intelligent Techniques ** Dept. of Mathematics. College

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Dynamic Selection of Ensembles of Classifiers Using Contextual Information

Dynamic Selection of Ensembles of Classifiers Using Contextual Information Dynamic Selection of Ensembles of Classifiers Using Contextual Information Paulo R. Cavalin 1, Robert Sabourin 1, and Ching Y. Suen 2 1 École de Technologie Supérieure, 1100 Notre-dame ouest, Montreal(QC),

More information

Texture Segmentation and Classification in Biomedical Image Processing

Texture Segmentation and Classification in Biomedical Image Processing Texture Segmentation and Classification in Biomedical Image Processing Aleš Procházka and Andrea Gavlasová Department of Computing and Control Engineering Institute of Chemical Technology in Prague Technická

More information

Neural Network based textural labeling of images in multimedia applications

Neural Network based textural labeling of images in multimedia applications Neural Network based textural labeling of images in multimedia applications S.A. Karkanis +, G.D. Magoulas +, and D.A. Karras ++ + University of Athens, Dept. of Informatics, Typa Build., Panepistimiopolis,

More information

Automatic Detection of Change in Address Blocks for Reply Forms Processing

Automatic Detection of Change in Address Blocks for Reply Forms Processing Automatic Detection of Change in Address Blocks for Reply Forms Processing K R Karthick, S Marshall and A J Gray Abstract In this paper, an automatic method to detect the presence of on-line erasures/scribbles/corrections/over-writing

More information

ISSN: [Mukund* et al., 6(4): April, 2017] Impact Factor: 4.116

ISSN: [Mukund* et al., 6(4): April, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ENGLISH CURSIVE SCRIPT RECOGNITION Miss.Yewale Poonam Mukund*, Dr. M.S.Deshpande * Electronics and Telecommunication, TSSM's Bhivarabai

More information

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION

STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION STUDY OF POSSIBILITY OF ON-PEN MATCHING FOR BIOMETRIC HANDWRITING VERIFICATION Tobias Scheidat, Claus Vielhauer, and Jana Dittmann Faculty of Computer Science, Otto-von-Guericke University Magdeburg, Universitätsplatz

More information

1. INTRODUCTION. AMS Subject Classification. 68U10 Image Processing

1. INTRODUCTION. AMS Subject Classification. 68U10 Image Processing ANALYSING THE NOISE SENSITIVITY OF SKELETONIZATION ALGORITHMS Attila Fazekas and András Hajdu Lajos Kossuth University 4010, Debrecen PO Box 12, Hungary Abstract. Many skeletonization algorithms have been

More information

Face Detection and Recognition in an Image Sequence using Eigenedginess

Face Detection and Recognition in an Image Sequence using Eigenedginess Face Detection and Recognition in an Image Sequence using Eigenedginess B S Venkatesh, S Palanivel and B Yegnanarayana Department of Computer Science and Engineering. Indian Institute of Technology, Madras

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

AN IMPROVED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION

AN IMPROVED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION AN IMPROVED K-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATION WILLIAM ROBSON SCHWARTZ University of Maryland, Department of Computer Science College Park, MD, USA, 20742-327, schwartz@cs.umd.edu RICARDO

More information

A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS

A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS 1 Dr. Umesh Sehgal and 2 Surender Saini 1 Asso. Prof. Arni University, umeshsehgalind@gmail.com 2

More information

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION

A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, Universität Karlsruhe (TH) 76131 Karlsruhe, Germany

More information

Client Dependent GMM-SVM Models for Speaker Verification

Client Dependent GMM-SVM Models for Speaker Verification Client Dependent GMM-SVM Models for Speaker Verification Quan Le, Samy Bengio IDIAP, P.O. Box 592, CH-1920 Martigny, Switzerland {quan,bengio}@idiap.ch Abstract. Generative Gaussian Mixture Models (GMMs)

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System Proc. of IEEE Conference on Computer Vision and Pattern Recognition, vol.2, II-131 II-137, Dec. 2001. Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

More information

Radial Basis Function Neural Network Classifier

Radial Basis Function Neural Network Classifier Recognition of Unconstrained Handwritten Numerals by a Radial Basis Function Neural Network Classifier Hwang, Young-Sup and Bang, Sung-Yang Department of Computer Science & Engineering Pohang University

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 18 Feature extraction and representation What will we learn? What is feature extraction and why is it a critical step in most computer vision and

More information